Hay
Date
July 22, 2025, 5:13 a.m.

Environment
qemu-arm64
qemu-x86_64

[   29.903927] ==================================================================
[   29.904258] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5a4/0x660
[   29.905110] Write of size 1 at addr fff00000c3f71873 by task kunit_try_catch/167
[   29.905224] 
[   29.906013] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   29.906167] Tainted: [N]=TEST
[   29.906200] Hardware name: linux,dummy-virt (DT)
[   29.906417] Call trace:
[   29.906589]  show_stack+0x20/0x38 (C)
[   29.906723]  dump_stack_lvl+0x8c/0xd0
[   29.906775]  print_report+0x118/0x5e8
[   29.906846]  kasan_report+0xdc/0x128
[   29.906894]  __asan_report_store1_noabort+0x20/0x30
[   29.906944]  kmalloc_oob_right+0x5a4/0x660
[   29.906992]  kunit_try_run_case+0x170/0x3f0
[   29.907042]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.907094]  kthread+0x328/0x630
[   29.907140]  ret_from_fork+0x10/0x20
[   29.907295] 
[   29.907336] Allocated by task 167:
[   29.907449]  kasan_save_stack+0x3c/0x68
[   29.907513]  kasan_save_track+0x20/0x40
[   29.907548]  kasan_save_alloc_info+0x40/0x58
[   29.907585]  __kasan_kmalloc+0xd4/0xd8
[   29.907622]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.907669]  kmalloc_oob_right+0xb0/0x660
[   29.907707]  kunit_try_run_case+0x170/0x3f0
[   29.907743]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.907784]  kthread+0x328/0x630
[   29.907828]  ret_from_fork+0x10/0x20
[   29.907882] 
[   29.907942] The buggy address belongs to the object at fff00000c3f71800
[   29.907942]  which belongs to the cache kmalloc-128 of size 128
[   29.908033] The buggy address is located 0 bytes to the right of
[   29.908033]  allocated 115-byte region [fff00000c3f71800, fff00000c3f71873)
[   29.908097] 
[   29.908175] The buggy address belongs to the physical page:
[   29.908577] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   29.908837] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.909161] page_type: f5(slab)
[   29.909451] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.909510] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.909608] page dumped because: kasan: bad access detected
[   29.909646] 
[   29.909671] Memory state around the buggy address:
[   29.909908]  fff00000c3f71700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.909975]  fff00000c3f71780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.910027] >fff00000c3f71800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.910079]                                                              ^
[   29.910164]  fff00000c3f71880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.910205]  fff00000c3f71900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.910266] ==================================================================
[   29.915660] ==================================================================
[   29.915707] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x5d0/0x660
[   29.915755] Read of size 1 at addr fff00000c3f71880 by task kunit_try_catch/167
[   29.915801] 
[   29.915846] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   29.916340] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.916423] Hardware name: linux,dummy-virt (DT)
[   29.916720] Call trace:
[   29.916754]  show_stack+0x20/0x38 (C)
[   29.917080]  dump_stack_lvl+0x8c/0xd0
[   29.917627]  print_report+0x118/0x5e8
[   29.917887]  kasan_report+0xdc/0x128
[   29.918333]  __asan_report_load1_noabort+0x20/0x30
[   29.918409]  kmalloc_oob_right+0x5d0/0x660
[   29.918777]  kunit_try_run_case+0x170/0x3f0
[   29.919159]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.919369]  kthread+0x328/0x630
[   29.919484]  ret_from_fork+0x10/0x20
[   29.919894] 
[   29.919998] Allocated by task 167:
[   29.920057]  kasan_save_stack+0x3c/0x68
[   29.920244]  kasan_save_track+0x20/0x40
[   29.920445]  kasan_save_alloc_info+0x40/0x58
[   29.920516]  __kasan_kmalloc+0xd4/0xd8
[   29.920709]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.920947]  kmalloc_oob_right+0xb0/0x660
[   29.921067]  kunit_try_run_case+0x170/0x3f0
[   29.921156]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.921282]  kthread+0x328/0x630
[   29.921338]  ret_from_fork+0x10/0x20
[   29.921373] 
[   29.921393] The buggy address belongs to the object at fff00000c3f71800
[   29.921393]  which belongs to the cache kmalloc-128 of size 128
[   29.921458] The buggy address is located 13 bytes to the right of
[   29.921458]  allocated 115-byte region [fff00000c3f71800, fff00000c3f71873)
[   29.921864] 
[   29.921889] The buggy address belongs to the physical page:
[   29.921925] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   29.922203] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.922391] page_type: f5(slab)
[   29.922602] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.923016] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.923408] page dumped because: kasan: bad access detected
[   29.923536] 
[   29.923828] Memory state around the buggy address:
[   29.923899]  fff00000c3f71780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.924062]  fff00000c3f71800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.924362] >fff00000c3f71880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.924409]                    ^
[   29.924438]  fff00000c3f71900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.924479]  fff00000c3f71980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.924591] ==================================================================
[   29.911029] ==================================================================
[   29.911067] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x538/0x660
[   29.911216] Write of size 1 at addr fff00000c3f71878 by task kunit_try_catch/167
[   29.911265] 
[   29.911331] CPU: 1 UID: 0 PID: 167 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT 
[   29.911413] Tainted: [B]=BAD_PAGE, [N]=TEST
[   29.911504] Hardware name: linux,dummy-virt (DT)
[   29.911533] Call trace:
[   29.911555]  show_stack+0x20/0x38 (C)
[   29.911603]  dump_stack_lvl+0x8c/0xd0
[   29.911649]  print_report+0x118/0x5e8
[   29.911693]  kasan_report+0xdc/0x128
[   29.911736]  __asan_report_store1_noabort+0x20/0x30
[   29.911784]  kmalloc_oob_right+0x538/0x660
[   29.912059]  kunit_try_run_case+0x170/0x3f0
[   29.912127]  kunit_gen
[   29.912127]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.912272]  kthread+0x328/0x630
[   29.912316]  ret_from_fork+0x10/0x20
[   29.912801] 
[   29.912905] Allocated by task 167:
[   29.912984]  kasan_save_stack+0x3c/0x68
[   29.913056]  kasan_save_track+0x20/0x40
[   29.913175]  kasan_save_alloc_info+0x40/0x58
[   29.913259]  __kasan_kmalloc+0xd4/0xd8
[   29.913292]  __kmalloc_cache_noprof+0x16c/0x3c0
[   29.913331]  kmalloc_oob_right+0xb0/0x660
[   29.913369]  kunit_try_run_case+0x170/0x3f0
[   29.913405]  kunit_generic_run_threadfn_adapter+0x88/0x100
[   29.913446]  kthread+0x328/0x630
[   29.913478]  ret_from_fork+0x10/0x20
[   29.913513] 
[   29.913531] The buggy address belongs to the object at fff00000c3f71800
[   29.913531]  which belongs to the cache kmalloc-128 of size 128
[   29.913586] The buggy address is located 5 bytes to the right of
[   29.913586]  allocated 115-byte region [fff00000c3f71800, fff00000c3f71873)
[   29.913646] 
[   29.913917] The buggy address belongs to the physical page:
[   29.914302] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x103f71
[   29.914500] flags: 0xbfffe0000000000(node=0|zone=2|lastcpupid=0x1ffff)
[   29.914610] page_type: f5(slab)
[   29.914658] raw: 0bfffe0000000000 fff00000c0001a00 dead000000000100 dead000000000122
[   29.914706] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   29.914744] page dumped because: kasan: bad access detected
[   29.914773] 
[   29.914790] Memory state around the buggy address:
[   29.914831]  fff00000c3f71700: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   29.914873]  fff00000c3f71780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.914923] >fff00000c3f71800: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   29.914960]                                                                 ^
[   29.915068]  fff00000c3f71880: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.915110]  fff00000c3f71900: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   29.915145] ==================================================================

[   24.418115] ==================================================================
[   24.418762] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6bd/0x7f0
[   24.419069] Write of size 1 at addr ffff8881058adf78 by task kunit_try_catch/184
[   24.419744] 
[   24.419848] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   24.419896] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.419909] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.419929] Call Trace:
[   24.419943]  <TASK>
[   24.419989]  dump_stack_lvl+0x73/0xb0
[   24.420045]  print_report+0xd1/0x640
[   24.420068]  ? __virt_addr_valid+0x1db/0x2d0
[   24.420092]  ? kmalloc_oob_right+0x6bd/0x7f0
[   24.420137]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.420197]  ? kmalloc_oob_right+0x6bd/0x7f0
[   24.420220]  kasan_report+0x141/0x180
[   24.420242]  ? kmalloc_oob_right+0x6bd/0x7f0
[   24.420268]  __asan_report_store1_noabort+0x1b/0x30
[   24.420292]  kmalloc_oob_right+0x6bd/0x7f0
[   24.420314]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.420337]  ? __schedule+0x10da/0x2b60
[   24.420363]  ? __pfx_read_tsc+0x10/0x10
[   24.420385]  ? ktime_get_ts64+0x86/0x230
[   24.420409]  kunit_try_run_case+0x1a5/0x480
[   24.420433]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.420456]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.420480]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.420505]  ? __kthread_parkme+0x82/0x180
[   24.420525]  ? preempt_count_sub+0x50/0x80
[   24.420549]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.420574]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.420597]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.420621]  kthread+0x337/0x6f0
[   24.420641]  ? trace_preempt_on+0x20/0xc0
[   24.420664]  ? __pfx_kthread+0x10/0x10
[   24.420684]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.420708]  ? calculate_sigpending+0x7b/0xa0
[   24.420731]  ? __pfx_kthread+0x10/0x10
[   24.420753]  ret_from_fork+0x116/0x1d0
[   24.420772]  ? __pfx_kthread+0x10/0x10
[   24.420793]  ret_from_fork_asm+0x1a/0x30
[   24.420823]  </TASK>
[   24.420845] 
[   24.430101] Allocated by task 184:
[   24.430398]  kasan_save_stack+0x45/0x70
[   24.430600]  kasan_save_track+0x18/0x40
[   24.430765]  kasan_save_alloc_info+0x3b/0x50
[   24.430955]  __kasan_kmalloc+0xb7/0xc0
[   24.431114]  __kmalloc_cache_noprof+0x189/0x420
[   24.431805]  kmalloc_oob_right+0xa9/0x7f0
[   24.432081]  kunit_try_run_case+0x1a5/0x480
[   24.432504]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.432935]  kthread+0x337/0x6f0
[   24.433274]  ret_from_fork+0x116/0x1d0
[   24.433692]  ret_from_fork_asm+0x1a/0x30
[   24.433900] 
[   24.433988] The buggy address belongs to the object at ffff8881058adf00
[   24.433988]  which belongs to the cache kmalloc-128 of size 128
[   24.435061] The buggy address is located 5 bytes to the right of
[   24.435061]  allocated 115-byte region [ffff8881058adf00, ffff8881058adf73)
[   24.436155] 
[   24.436396] The buggy address belongs to the physical page:
[   24.436753] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ad
[   24.437511] flags: 0x200000000000000(node=0|zone=2)
[   24.437807] page_type: f5(slab)
[   24.438088] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.438991] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.439494] page dumped because: kasan: bad access detected
[   24.439919] 
[   24.440016] Memory state around the buggy address:
[   24.440475]  ffff8881058ade00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.440776]  ffff8881058ade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.441067] >ffff8881058adf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.441941]                                                                 ^
[   24.442446]  ffff8881058adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.442941]  ffff8881058ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.443467] ==================================================================
[   24.444435] ==================================================================
[   24.444748] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x68a/0x7f0
[   24.445042] Read of size 1 at addr ffff8881058adf80 by task kunit_try_catch/184
[   24.446012] 
[   24.446243] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G    B            N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   24.446297] Tainted: [B]=BAD_PAGE, [N]=TEST
[   24.446310] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.446331] Call Trace:
[   24.446347]  <TASK>
[   24.446362]  dump_stack_lvl+0x73/0xb0
[   24.446429]  print_report+0xd1/0x640
[   24.446455]  ? __virt_addr_valid+0x1db/0x2d0
[   24.446478]  ? kmalloc_oob_right+0x68a/0x7f0
[   24.446499]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.446525]  ? kmalloc_oob_right+0x68a/0x7f0
[   24.446547]  kasan_report+0x141/0x180
[   24.446569]  ? kmalloc_oob_right+0x68a/0x7f0
[   24.446596]  __asan_report_load1_noabort+0x18/0x20
[   24.446620]  kmalloc_oob_right+0x68a/0x7f0
[   24.446642]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.446665]  ? __schedule+0x10da/0x2b60
[   24.446693]  ? __pfx_read_tsc+0x10/0x10
[   24.446715]  ? ktime_get_ts64+0x86/0x230
[   24.446738]  kunit_try_run_case+0x1a5/0x480
[   24.446763]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.446785]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.446810]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.446846]  ? __kthread_parkme+0x82/0x180
[   24.446866]  ? preempt_count_sub+0x50/0x80
[   24.446889]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.446913]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.446937]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.446961]  kthread+0x337/0x6f0
[   24.446981]  ? trace_preempt_on+0x20/0xc0
[   24.447004]  ? __pfx_kthread+0x10/0x10
[   24.447025]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.447048]  ? calculate_sigpending+0x7b/0xa0
[   24.447071]  ? __pfx_kthread+0x10/0x10
[   24.447092]  ret_from_fork+0x116/0x1d0
[   24.447112]  ? __pfx_kthread+0x10/0x10
[   24.447132]  ret_from_fork_asm+0x1a/0x30
[   24.447162]  </TASK>
[   24.447174] 
[   24.454972] Allocated by task 184:
[   24.455157]  kasan_save_stack+0x45/0x70
[   24.455356]  kasan_save_track+0x18/0x40
[   24.455503]  kasan_save_alloc_info+0x3b/0x50
[   24.455653]  __kasan_kmalloc+0xb7/0xc0
[   24.455785]  __kmalloc_cache_noprof+0x189/0x420
[   24.456024]  kmalloc_oob_right+0xa9/0x7f0
[   24.456221]  kunit_try_run_case+0x1a5/0x480
[   24.456435]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.456684]  kthread+0x337/0x6f0
[   24.456823]  ret_from_fork+0x116/0x1d0
[   24.456997]  ret_from_fork_asm+0x1a/0x30
[   24.457136] 
[   24.457206] The buggy address belongs to the object at ffff8881058adf00
[   24.457206]  which belongs to the cache kmalloc-128 of size 128
[   24.457679] The buggy address is located 13 bytes to the right of
[   24.457679]  allocated 115-byte region [ffff8881058adf00, ffff8881058adf73)
[   24.458542] 
[   24.458616] The buggy address belongs to the physical page:
[   24.458789] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ad
[   24.459346] flags: 0x200000000000000(node=0|zone=2)
[   24.459570] page_type: f5(slab)
[   24.459711] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.460041] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.460383] page dumped because: kasan: bad access detected
[   24.460593] 
[   24.460684] Memory state around the buggy address:
[   24.460897]  ffff8881058ade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.461205]  ffff8881058adf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.461474] >ffff8881058adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.461748]                    ^
[   24.461900]  ffff8881058ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.462157]  ffff8881058ae080: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.462448] ==================================================================
[   24.394402] ==================================================================
[   24.395015] BUG: KASAN: slab-out-of-bounds in kmalloc_oob_right+0x6f0/0x7f0
[   24.395818] Write of size 1 at addr ffff8881058adf73 by task kunit_try_catch/184
[   24.396251] 
[   24.397192] CPU: 1 UID: 0 PID: 184 Comm: kunit_try_catch Tainted: G                 N  6.16.0-rc7-next-20250722 #1 PREEMPT(voluntary) 
[   24.397533] Tainted: [N]=TEST
[   24.397566] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   24.397801] Call Trace:
[   24.397882]  <TASK>
[   24.398024]  dump_stack_lvl+0x73/0xb0
[   24.398112]  print_report+0xd1/0x640
[   24.398141]  ? __virt_addr_valid+0x1db/0x2d0
[   24.398178]  ? kmalloc_oob_right+0x6f0/0x7f0
[   24.398200]  ? kasan_complete_mode_report_info+0x2a/0x200
[   24.398226]  ? kmalloc_oob_right+0x6f0/0x7f0
[   24.398248]  kasan_report+0x141/0x180
[   24.398271]  ? kmalloc_oob_right+0x6f0/0x7f0
[   24.398297]  __asan_report_store1_noabort+0x1b/0x30
[   24.398321]  kmalloc_oob_right+0x6f0/0x7f0
[   24.398344]  ? __pfx_kmalloc_oob_right+0x10/0x10
[   24.398367]  ? __schedule+0x10da/0x2b60
[   24.398394]  ? __pfx_read_tsc+0x10/0x10
[   24.398417]  ? ktime_get_ts64+0x86/0x230
[   24.398445]  kunit_try_run_case+0x1a5/0x480
[   24.398472]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.398495]  ? _raw_spin_lock_irqsave+0xa1/0x100
[   24.398520]  ? _raw_spin_unlock_irqrestore+0x5f/0x90
[   24.398545]  ? __kthread_parkme+0x82/0x180
[   24.398567]  ? preempt_count_sub+0x50/0x80
[   24.398591]  ? __pfx_kunit_try_run_case+0x10/0x10
[   24.398616]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.398640]  ? __pfx_kunit_generic_run_threadfn_adapter+0x10/0x10
[   24.398663]  kthread+0x337/0x6f0
[   24.398683]  ? trace_preempt_on+0x20/0xc0
[   24.398708]  ? __pfx_kthread+0x10/0x10
[   24.398729]  ? _raw_spin_unlock_irq+0x47/0x80
[   24.398752]  ? calculate_sigpending+0x7b/0xa0
[   24.398777]  ? __pfx_kthread+0x10/0x10
[   24.398799]  ret_from_fork+0x116/0x1d0
[   24.398820]  ? __pfx_kthread+0x10/0x10
[   24.398853]  ret_from_fork_asm+0x1a/0x30
[   24.398908]  </TASK>
[   24.398972] 
[   24.405812] Allocated by task 184:
[   24.406163]  kasan_save_stack+0x45/0x70
[   24.406444]  kasan_save_track+0x18/0x40
[   24.406641]  kasan_save_alloc_info+0x3b/0x50
[   24.406866]  __kasan_kmalloc+0xb7/0xc0
[   24.407076]  __kmalloc_cache_noprof+0x189/0x420
[   24.407286]  kmalloc_oob_right+0xa9/0x7f0
[   24.407431]  kunit_try_run_case+0x1a5/0x480
[   24.407635]  kunit_generic_run_threadfn_adapter+0x85/0xf0
[   24.407923]  kthread+0x337/0x6f0
[   24.408089]  ret_from_fork+0x116/0x1d0
[   24.408287]  ret_from_fork_asm+0x1a/0x30
[   24.408483] 
[   24.408602] The buggy address belongs to the object at ffff8881058adf00
[   24.408602]  which belongs to the cache kmalloc-128 of size 128
[   24.409443] The buggy address is located 0 bytes to the right of
[   24.409443]  allocated 115-byte region [ffff8881058adf00, ffff8881058adf73)
[   24.409881] 
[   24.410032] The buggy address belongs to the physical page:
[   24.410885] page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x1058ad
[   24.411444] flags: 0x200000000000000(node=0|zone=2)
[   24.412057] page_type: f5(slab)
[   24.412694] raw: 0200000000000000 ffff888100041a00 dead000000000122 0000000000000000
[   24.413048] raw: 0000000000000000 0000000080100010 00000000f5000000 0000000000000000
[   24.413476] page dumped because: kasan: bad access detected
[   24.413720] 
[   24.413826] Memory state around the buggy address:
[   24.414365]  ffff8881058ade00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.414731]  ffff8881058ade80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.415132] >ffff8881058adf00: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 03 fc
[   24.415512]                                                              ^
[   24.415881]  ffff8881058adf80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   24.416247]  ffff8881058ae000: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   24.416570] ==================================================================